Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
  HOME     MENU     SEARCH     NEWSLETTER    
CUSTOMER RELATIONSHIP MANAGEMENT NEWS. UPDATED 12 MINUTES AGO.
You are here: Home / Network Security / NSA Planned To Hack Android Phones
NSA Planned To Hijack Google Play Store, Hack Android Phones
NSA Planned To Hijack Google Play Store, Hack Android Phones
By Jef Cozza / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MAY
22
2015
The National Security Agency (NSA) collaborated with the governments of four other countries on a planned attack that sought to infect millions of smartphones with spyware, according to a new report. The program, with the codename Irritant Horn, was designed to hijack the phones’ connections to app stores operated by Samsung and Google that would allow spies to surreptitiously steal data from users’ devices.

The report, first published by Canada’s CBC network and the Intercept, a news site founded by reporter Glen Greenwald, was based on internal NSA documents provided by former government contractor and NSA whistleblower Edward Snowden. The group behind the plan was the “Five Eyes” network, a collection of allied surveillance agencies from the U.S., the U.K., Canada, Australia and New Zealand that regularly collaborate on cyber-espionage and spying.

Ministry of Misinformation

The details of the hack were laid out in the PowerPoint presentation “Synergising Network Analysis and Tradecraft,” which served as the basis for a series of workshops held in Canada and Australia from 2011 to 2012.

The presentation explained that the NSA had planned to use the XKEYSCORE hacking tool to launch a man-in-the-middle attack from Samsung and Google servers. The XKEYSCORE tool allows governments to wiretap any user for whom they have a personal e-mail address, according to previously published statements by Snowden.

While earlier reports had already disclosed that the NSA and the Five Eyes governments had created spyware to attack Android and iPhone devices, the latest revelation indicated that the espionage agency was also interested in using the technique to plant misinformation on users’ phones. The agency seemed particularly interested in the potential of the technology to disrupt and prevent protests and citizen movements.

UC Browser Exploit

The presentation also described a vulnerability the NSA had discovered in the UC Browser application. Although UC Browser is not widely used in the Western world, it reportedly has around half a billion users, mainly in India and China. The exploit would allow the agency to gather information that would allow it to accurately identify the user of a device, according to the presentation.

Alibaba, the online retailing company that is behind UC Browser, has since been made aware of the exploit, which was leaking search query terms, SIM card numbers and unique device identifiers. The company behind the browser said that the vulnerability has since been fixed.

The NSA’s decision not to alert UC Browser of its vulnerability once discovered may have exposed several hundred million users to attacks from criminal hackers, who may have discovered the exploit on their own, according to the Intercept.

While the exact technique behind the attack is a new development, this is not the first time the NSA has sought to launch widespread cyberattacks against computer users. In one instance, the agency reportedly disguised itself as a Facebook server to break into computers attempting to access the social media network.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
MORE IN NETWORK SECURITY

NETWORK SECURITY SPOTLIGHT
A security researcher has found that hundreds of different models of HP notebooks, tablets, and other devices include a keylogger that could track and record every keystroke a user makes.

CRM DAILY
NEWSFACTOR NETWORK SITES
NEWSFACTOR SERVICES
© Copyright 2017 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.